SETUP |
|
|
|
1 | (18) |
|
|
1 | (1) |
|
An Installation Checklist |
|
|
1 | (2) |
|
Before You Install Your System |
|
|
3 | (9) |
|
Develop an Installation Plan |
|
|
3 | (2) |
|
|
5 | (1) |
|
|
5 | (1) |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
7 | (1) |
|
|
7 | (1) |
|
|
8 | (1) |
|
|
8 | (1) |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
10 | (2) |
|
|
12 | (1) |
|
Develop a Backup and Recovery Plan |
|
|
12 | (3) |
|
Establish Naming Conventions |
|
|
15 | (3) |
|
|
15 | (1) |
|
|
16 | (2) |
|
|
18 | (1) |
|
That Important First Session |
|
|
19 | (14) |
|
|
19 | (1) |
|
Verify Software and PTF Levels |
|
|
20 | (1) |
|
Signing On for the First Time |
|
|
20 | (5) |
|
|
20 | (1) |
|
Set the Password Format Control System Values |
|
|
20 | (1) |
|
Change the System-Supplied User Profile Passwords |
|
|
21 | (2) |
|
Enable/Disable Autoconfiguration |
|
|
23 | (1) |
|
Set General System Values |
|
|
23 | (2) |
|
Establishing Your Work Environment |
|
|
25 | (6) |
|
Establish Your Subsystems |
|
|
26 | (2) |
|
Retrieve and Modify the Star-up Program |
|
|
28 | (3) |
|
|
31 | (2) |
|
|
33 | (36) |
|
|
33 | (2) |
|
|
35 | (10) |
|
|
35 | (1) |
|
|
35 | (1) |
|
PwdExp (Set Password to Expired) |
|
|
36 | (1) |
|
|
36 | (1) |
|
UsrCls (User Class) and SpcAut (Special Authority) |
|
|
36 | (3) |
|
|
39 | (2) |
|
|
41 | (1) |
|
|
42 | (1) |
|
|
43 | (1) |
|
|
44 | (1) |
|
|
44 | (1) |
|
|
45 | (1) |
|
|
45 | (1) |
|
Maintaining User Profiles |
|
|
46 | (4) |
|
|
47 | (1) |
|
|
47 | (3) |
|
Integrity: The CpyUsr and CrtUsr Commands |
|
|
50 | (17) |
|
Making User Profiles Work for You |
|
|
67 | (2) |
|
|
69 | (8) |
|
What Are Public Authorities? |
|
|
70 | (4) |
|
Creating Public Authority by Default |
|
|
72 | (2) |
|
Limiting Public Authority |
|
|
74 | (1) |
|
Public Authority by Design |
|
|
74 | (1) |
|
Object-Level Public Authority |
|
|
75 | (2) |
|
|
77 | (16) |
|
Planning is Preventive Medicine |
|
|
77 | (1) |
|
|
78 | (8) |
|
Pre-Installation-Day Tasks |
|
|
78 | (1) |
|
Step 1: Is Your Order Complete? |
|
|
79 | (2) |
|
Step 2: Manual or Automatic? |
|
|
81 | (1) |
|
Step 3: Permanently Apply PTFs |
|
|
82 | (1) |
|
Step 4: Clean Up Your System |
|
|
82 | (1) |
|
Step 5: Is There Enough Room? |
|
|
83 | (1) |
|
Step 6: Document System Changes |
|
|
84 | (1) |
|
Step 7: Get the Latest Fixes |
|
|
84 | (1) |
|
|
84 | (1) |
|
|
85 | (1) |
|
Step 9: Resolve Pending Operations |
|
|
85 | (1) |
|
Step 10: Shut Down the INS/IXS |
|
|
85 | (1) |
|
|
86 | (1) |
|
Step 11: Verify System Integrity |
|
|
86 | (1) |
|
Step 12: Check System Values |
|
|
87 | (1) |
|
|
87 | (4) |
|
|
91 | (2) |
|
|
93 | (10) |
|
|
93 | (1) |
|
|
94 | (2) |
|
|
94 | (2) |
|
Ordering PTFs on the Internet |
|
|
96 | (1) |
|
How Do You Install and Apply a PTF? |
|
|
96 | (1) |
|
PTFs and Logical Partitioning (LPAR) |
|
|
97 | (3) |
|
Installing Licensed Internal Code PTFs |
|
|
98 | (1) |
|
Installing Licensed Program Product PTFs |
|
|
99 | (1) |
|
Verifying Your PTF Installation |
|
|
99 | (1) |
|
|
100 | (1) |
|
Developing a Proactive PTF Management Strategy |
|
|
100 | (3) |
|
Preventive Service Planning |
|
|
100 | (1) |
|
|
101 | (1) |
|
|
102 | (1) |
OPERATIONS |
|
|
Getting Your Message Across: User-to-User |
|
|
103 | (8) |
|
|
103 | (2) |
|
Sending Messages into History |
|
|
105 | (1) |
|
Message Delivery with SndMsg |
|
|
105 | (1) |
|
|
106 | (1) |
|
Messaging with Operational Assistant |
|
|
107 | (1) |
|
|
108 | (3) |
|
Secrets of a Message Shortstop |
|
|
111 | (12) |
|
|
111 | (6) |
|
|
113 | (4) |
|
|
117 | (4) |
|
|
117 | (4) |
|
|
121 | (2) |
|
Printer Files, Job Logs, and Print Direction |
|
|
123 | (20) |
|
How Do You Make It Print Like This? |
|
|
123 | (4) |
|
Controlling When a Report Is Printed |
|
|
126 | (1) |
|
Controlling Your Job Logs |
|
|
127 | (6) |
|
Conrolling Where the Printed Output Is Directed |
|
|
128 | (2) |
|
Deciding to Generate a Printed Job Log for Normally Completed Jobs |
|
|
130 | (2) |
|
Determining How Much Information to Include in Job Logs |
|
|
132 | (1) |
|
Where Have All the Reports Gone? |
|
|
133 | (5) |
|
Tailoring Print Direction |
|
|
134 | (1) |
|
|
134 | (1) |
|
|
135 | (1) |
|
|
135 | (1) |
|
|
136 | (1) |
|
|
136 | (1) |
|
|
137 | (1) |
|
|
137 | (1) |
|
|
138 | (2) |
|
Job QPrtJob and Print Direction |
|
|
140 | (2) |
|
|
142 | (1) |
|
Understanding Output Queues |
|
|
143 | (14) |
|
|
143 | (2) |
|
How to Create Output Queues |
|
|
145 | (4) |
|
|
147 | (1) |
|
|
148 | (1) |
|
|
148 | (1) |
|
Who Should Create Output Queues? |
|
|
149 | (1) |
|
How Spooled Files Get on the Queue |
|
|
150 | (1) |
|
How Spooled Files Are Printed from the Queue |
|
|
151 | (2) |
|
A Different View of Spooled Files |
|
|
153 | (2) |
|
How to Organize Output Queues |
|
|
155 | (2) |
|
A Plug-and-Play Output Queue Monitor |
|
|
157 | (56) |
|
|
158 | (2) |
|
The Output Queue Monitor Utility |
|
|
160 | (5) |
|
Configuring the Output Queue Monitor |
|
|
162 | (1) |
|
Using the Output Queue Monitor |
|
|
163 | (1) |
|
Monitoring Program OutQMon |
|
|
164 | (1) |
|
Installing the Output Queue Monitor Utility |
|
|
165 | (48) |
|
|
213 | (16) |
|
Automatic Cleanup Procedures |
|
|
213 | (3) |
|
Manual Cleanup Procedures |
|
|
216 | (4) |
|
Detach, Save, and Clean Up Security Audit Journal Receivers |
|
|
217 | (1) |
|
Reclaim Spool File Storage |
|
|
217 | (1) |
|
Reclaim Storage and Clean Up Recovery Areas |
|
|
218 | (1) |
|
How RclStg Deals with Lost Objects |
|
|
218 | (2) |
|
|
220 | (1) |
|
Commands Used in Recovery Area Cleanup |
|
|
220 | (6) |
|
Remove Unused Licensed Program Products |
|
|
222 | (1) |
|
Permanently Apply PTFs as Necessary |
|
|
222 | (1) |
|
Detach, Save, and Clean Up Journal Receivers |
|
|
222 | (1) |
|
Reset User Message Queue Size |
|
|
222 | (1) |
|
|
223 | (1) |
|
Clear or Delete Unneeded Save Files |
|
|
223 | (1) |
|
|
223 | (2) |
|
Reorganize Document Library Objects |
|
|
225 | (1) |
|
Purge and Reorganize Physical Files |
|
|
225 | (1) |
|
Clean Up Office Vision for AS/400 Objects |
|
|
225 | (1) |
|
Clean Up Hardware Configuration |
|
|
226 | (1) |
|
Enhancing Your Manual Procedures |
|
|
226 | (3) |
|
All Aboard the OS/400 Job Scheduler! |
|
|
229 | (18) |
|
|
229 | (1) |
|
Running on a Strick Schedule |
|
|
230 | (5) |
|
Two Trains on the Same Track |
|
|
235 | (7) |
|
|
242 | (5) |
|
Job Schedule Entries and the LDA |
|
|
243 | (1) |
|
SbmJob vs. the Job Scheduler |
|
|
243 | (1) |
|
|
244 | (1) |
|
System Date and Time Changes |
|
|
244 | (1) |
|
Detecting the Completion of Other Jobs |
|
|
245 | (2) |
|
|
247 | (6) |
|
|
247 | (4) |
|
System Message Show and Tell |
|
|
247 | (2) |
|
|
249 | (2) |
|
|
251 | (2) |
SYSTEM MANAGEMENT |
|
|
|
253 | (26) |
|
Designing and Implementing a Backup Strategy |
|
|
253 | (2) |
|
|
255 | (6) |
|
Implementing a Simple Backup Strategy |
|
|
258 | (1) |
|
Implementing a Simple Backup Strategy |
|
|
259 | (1) |
|
|
259 | (1) |
|
Journaling Objects and Saving the Journal Receivers |
|
|
260 | (1) |
|
Saving Groups of User Libraries, Folders, or Directories |
|
|
261 | (1) |
|
Implementing a Complex Backup Strategy |
|
|
261 | (1) |
|
Saving Data Concurrently Using Multiple Tape Devices |
|
|
261 | (1) |
|
Saving Data in Parallel Using Multiple Tape Devices |
|
|
262 | (1) |
|
|
262 | (1) |
|
An Alternative Backup Strategy |
|
|
262 | (1) |
|
The Inner Workings of Menu SAVE |
|
|
262 | (5) |
|
Entire System (Option 21) |
|
|
263 | (1) |
|
System Data Only (Option 22) |
|
|
264 | (1) |
|
All User Data (Option 23) |
|
|
264 | (1) |
|
Setting Save Option Defaults |
|
|
265 | (1) |
|
Printing System Information |
|
|
266 | (1) |
|
Saving Data Concurrently Using Multiple Tape Devices |
|
|
267 | (2) |
|
Concurrent Saves of Libraries and Objects |
|
|
267 | (1) |
|
Concurrent Saves of DLOs (Folders) |
|
|
268 | (1) |
|
Concurrent Saves of Objects in Directories |
|
|
269 | (1) |
|
|
269 | (2) |
|
How Does Save-While-Active Work? |
|
|
269 | (1) |
|
|
269 | (2) |
|
Save Commands That Support the Save-While-Active Option |
|
|
271 | (1) |
|
|
271 | (1) |
|
|
272 | (1) |
|
Preparing and Managing Your Backup Media |
|
|
273 | (6) |
|
Backup, Recovery and Media Services (BRMS) Overview |
|
|
279 | (16) |
|
|
279 | (1) |
|
Getting Started with BRMS |
|
|
280 | (2) |
|
Saving Data in Parallel with BRMS |
|
|
282 | (1) |
|
Online Backup of Lotus Notes Servers with BRMS |
|
|
282 | (1) |
|
Restricted-State Saves Using BRMS |
|
|
283 | (1) |
|
Backing Up Spooled Files with BRMS |
|
|
283 | (2) |
|
Including Spooled File Entries in a Backup List |
|
|
284 | (1) |
|
Restoring Spooled Files Saved Using BRMS |
|
|
285 | (1) |
|
The BRMS Operations Navigator Interface |
|
|
285 | (2) |
|
|
286 | (1) |
|
|
286 | (1) |
|
Backup and Recovery with BRMS OpsNav |
|
|
287 | (2) |
|
|
287 | (1) |
|
Creating a BRMS Backup Policy |
|
|
287 | (1) |
|
Backing Up Individual Items |
|
|
288 | (1) |
|
Restoring Individual Items |
|
|
288 | (1) |
|
Scheduling Unattended Backup and Restore Operations |
|
|
288 | (1) |
|
|
289 | (1) |
|
|
289 | (3) |
|
Security Options for BRMS Functions, Components, and Items |
|
|
290 | (2) |
|
|
292 | (1) |
|
|
292 | (1) |
|
|
293 | (2) |
|
|
295 | (10) |
|
|
295 | (2) |
|
|
297 | (1) |
|
Main Storage and Subsystem Pool Definitions |
|
|
298 | (3) |
|
|
301 | (2) |
|
|
303 | (2) |
|
|
305 | (10) |
|
|
305 | (8) |
|
|
306 | (1) |
|
Using Workstation Entries |
|
|
307 | (1) |
|
Conflicting Workstation Entries |
|
|
308 | (1) |
|
|
309 | (2) |
|
|
311 | (1) |
|
|
312 | (1) |
|
|
313 | (1) |
|
|
313 | (2) |
|
|
315 | (14) |
|
The Importance of Routing Data |
|
|
315 | (4) |
|
|
317 | (1) |
|
|
318 | (1) |
|
Routing Data for Interactive Jobs |
|
|
319 | (1) |
|
Routing Data for Batch Jobs |
|
|
320 | (2) |
|
Routing Data for Autostart, Communications, and Prestart Jobs |
|
|
322 | (1) |
|
Is There More Than One Way to Get There? |
|
|
322 | (1) |
|
|
322 | (7) |
FILE BASICS |
|
|
|
329 | (8) |
|
|
329 | (2) |
|
|
331 | (3) |
|
|
334 | (3) |
|
|
334 | (1) |
|
|
334 | (1) |
|
|
335 | (1) |
|
|
336 | (1) |
|
|
336 | (1) |
|
So You Think You Understand File Overrides |
|
|
337 | (24) |
|
|
337 | (2) |
|
|
339 | (2) |
|
The Call Stack and Job Call Levels |
|
|
339 | (1) |
|
|
340 | (1) |
|
|
341 | (15) |
|
|
341 | (1) |
|
Overriding the Same File Multiple Times |
|
|
342 | (2) |
|
The Order of Applying Overrides |
|
|
344 | (9) |
|
|
353 | (1) |
|
Explicitly Removing an Override |
|
|
354 | (1) |
|
|
355 | (1) |
|
Important Additional Override Information |
|
|
356 | (1) |
|
Overriding the Scope of Open Files |
|
|
356 | (1) |
|
|
356 | (1) |
|
Overrides and Multithreaded Jobs |
|
|
357 | (1) |
|
|
357 | (1) |
|
Is All This Really Necessary? |
|
|
357 | (1) |
|
Overrides and System Commands |
|
|
358 | (3) |
|
|
361 | (10) |
|
Record Format Definition/Physical File Selection |
|
|
361 | (3) |
|
|
364 | (1) |
|
|
365 | (4) |
|
Using Select/Omit Statements |
|
|
366 | (2) |
|
Dynamic Selection with Select/Omit |
|
|
368 | (1) |
|
Multiple Logical File Members |
|
|
369 | (1) |
|
Keys to the iSeries Database |
|
|
370 | (1) |
|
|
371 | (16) |
|
|
371 | (2) |
|
|
373 | (8) |
|
Shared Database File Example |
|
|
373 | (3) |
|
Shared Printer File Example |
|
|
376 | (5) |
|
How Sharing ODPs Can Help |
|
|
381 | (1) |
|
Share and Enhance Program Performance |
|
|
381 | (6) |
BASIC CL PROGRAMMING |
|
|
CL Programming: You're Stylin' Now! |
|
|
387 | (16) |
|
|
387 | (3) |
|
Developing Stylistic Standards |
|
|
390 | (11) |
|
|
397 | (1) |
|
|
398 | (1) |
|
|
399 | (1) |
|
|
400 | (1) |
|
Miscellaneous Suggestions |
|
|
400 | (1) |
|
|
401 | (1) |
|
|
401 | (2) |
|
Extend CL's Reach with APIs |
|
|
403 | (24) |
|
|
403 | (2) |
|
Reporting Errors with APIs |
|
|
405 | (7) |
|
|
407 | (5) |
|
|
412 | (14) |
|
|
416 | (10) |
|
|
426 | (1) |
|
CL Programs and Database Files |
|
|
427 | (14) |
|
|
427 | (1) |
|
|
427 | (1) |
|
Extracting Field Definitions |
|
|
428 | (2) |
|
Reading the Database File |
|
|
430 | (2) |
|
|
432 | (1) |
|
Rules for Database File Processing in CL |
|
|
433 | (1) |
|
What About Record Output? |
|
|
434 | (1) |
|
|
435 | (6) |
|
CL Programs and Display Files |
|
|
441 | (12) |
|
|
441 | (4) |
|
|
445 | (7) |
|
|
449 | (1) |
|
|
450 | (2) |
|
|
452 | (1) |
|
|
453 | (12) |
|
|
453 | (1) |
|
|
454 | (1) |
|
Start with a File and a Format |
|
|
454 | (3) |
|
|
457 | (5) |
|
|
458 | (1) |
|
|
458 | (1) |
|
|
459 | (3) |
|
Differentiate Between Upper- and Lowercase Data |
|
|
462 | (1) |
|
|
462 | (1) |
|
|
463 | (1) |
|
OpnQryF Command Performance |
|
|
464 | (1) |
|
Teaching Programs to Talk |
|
|
465 | (20) |
|
Putting SndUsrMsg to Work |
|
|
465 | (6) |
|
Send Break Messages to a User with SndBrkMsgU |
|
|
471 | (13) |
|
|
484 | (1) |
|
|
485 | (12) |
|
|
485 | (2) |
|
|
487 | (1) |
|
|
488 | (5) |
|
|
491 | (2) |
|
|
493 | (1) |
|
|
493 | (4) |
|
|
497 | (14) |
|
Receiving the Right Message |
|
|
497 | (3) |
|
RcvMsg and the MsgType and MsgKey Parameters |
|
|
500 | (1) |
|
Receiving the Right Values |
|
|
501 | (3) |
|
Retrieving Message Sender Data |
|
|
501 | (1) |
|
Retrieving the Message Return Type |
|
|
502 | (2) |
|
|
504 | (6) |
|
Command-Level Message Monitoring |
|
|
506 | (1) |
|
Global Message Monitoring |
|
|
506 | (2) |
|
Message Processing in Action |
|
|
508 | (2) |
|
What Else Can You Do with Messages? |
|
|
510 | (1) |
|
|
511 | (8) |
|
Commands: The Heart of the System |
|
|
511 | (3) |
|
Tips for Entering Commands |
|
|
514 | (2) |
|
|
516 | (1) |
|
|
517 | (2) |
THE NEW FACE OF THE SYSTEM |
|
|
It's Gotta Be TCP/IP, If You Wanna Talk with Me |
|
|
519 | (22) |
|
Networks and Internetworks |
|
|
520 | (4) |
|
|
524 | (5) |
|
|
524 | (2) |
|
Classless Addressing and Subnetworks |
|
|
526 | (3) |
|
|
529 | (1) |
|
A Simple iSeries Configuration |
|
|
530 | (6) |
|
|
535 | (1) |
|
TCP/IP Administration and Configuration Options |
|
|
536 | (2) |
|
Identifying Other Hosts in Your Network |
|
|
538 | (2) |
|
|
540 | (1) |
|
|
541 | (16) |
|
|
541 | (12) |
|
|
543 | (6) |
|
|
549 | (1) |
|
Configuration and Service |
|
|
549 | (1) |
|
|
550 | (1) |
|
|
550 | (1) |
|
|
551 | (1) |
|
|
551 | (1) |
|
|
551 | (1) |
|
|
552 | (1) |
|
|
552 | (1) |
|
|
552 | (1) |
|
|
552 | (1) |
|
Application Administration |
|
|
553 | (1) |
|
|
553 | (1) |
|
More Than Just a Pretty Face |
|
|
553 | (1) |
|
|
554 | (3) |
Further Reading |
|
557 | (4) |
Index |
|
561 | |